KDD CUP 2020 ML Track 2 "Adversarial Attacks and Defense on Academic Graph": 1st Place Solution
☆20Sep 29, 2020Updated 5 years ago
Alternatives and similar repositories for KDD_CUP_2020_MLTrack2_SPEIT
Users that are interested in KDD_CUP_2020_MLTrack2_SPEIT are comparing it to the libraries listed below
Sorting:
- Take further steps in the arms race of adversarial examples with only preprocessing.☆37Aug 4, 2020Updated 5 years ago
- Graph Injection Adversarial Attack & Defense Dataset , extracted from KDD CUP 2020 ML2 Track☆22Aug 19, 2024Updated last year
- Code for Towards More Practical Adversarial Attacks on Graph Neural Networks (NeurIPS 2020)☆28Nov 13, 2021Updated 4 years ago
- [ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability☆38Nov 27, 2023Updated 2 years ago
- ☆14May 14, 2019Updated 6 years ago
- Benchmark scripts for comparing tutorials in PyTorch and JAX☆14Aug 25, 2022Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- ☆10Jan 7, 2026Updated 2 months ago
- Experiments with reasoning models, training techniques, papers☆25Updated this week
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- Deep reinforcement learning + double oracle framework for Robust Restless Bandits☆10Jul 4, 2021Updated 4 years ago
- ☆26Updated this week
- An FL algorithm inspired by FedGMA☆10Oct 21, 2023Updated 2 years ago
- EMNLP 2020: Filtering before Iteratively Referring for Knowledge-Grounded Response Selection in Retrieval-Based Chatbots☆12Dec 15, 2020Updated 5 years ago
- ☆17Jun 26, 2021Updated 4 years ago
- Official Code For Dual Grained Quantization: Efficient Fine-Grained Quantization for LLM☆14Dec 27, 2023Updated 2 years ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- Code used to create the Linked WikiText-2 dataset☆16May 22, 2023Updated 2 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆15Feb 16, 2022Updated 4 years ago
- This is the official implementation of ICLR 2024 paper "VDC: Versatile Data Cleanser based on Visual-Linguistic Inconsistency by Multimod…☆19Feb 24, 2025Updated last year
- The official code for ``An Engorgio Prompt Makes Large Language Model Babble on''☆21Aug 9, 2025Updated 7 months ago
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆63Dec 20, 2024Updated last year
- Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem☆20Oct 27, 2021Updated 4 years ago
- This repository summarizes the related works on GNN and GNN-based recommendation.☆15Jun 25, 2021Updated 4 years ago
- ☆17Mar 30, 2023Updated 2 years ago
- Official Implementation for PlugIn Inversion☆16Oct 23, 2021Updated 4 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Dec 8, 2022Updated 3 years ago
- This repository contains the official implementation of the paper "Reliable Graph Neural Networks via Robust Aggregation" (NeurIPS, 2020)…☆18Mar 16, 2022Updated 3 years ago
- competition☆17Aug 1, 2020Updated 5 years ago
- Source code for ScaleGrad☆19Dec 28, 2021Updated 4 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Jun 2, 2022Updated 3 years ago
- PhD thesis (updating) of Jiatao Gu from HKU☆19Aug 10, 2018Updated 7 years ago
- Apply Iprompt on GLM with innovative new methods. Currently support Chinese QA, English QA and Chinese poem generation.☆20Jun 16, 2022Updated 3 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 2 years ago
- Adversarially Robust Transfer Learning with LWF loss applied to the deep feature representation (penultimate) layer☆19Feb 9, 2020Updated 6 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆76Apr 1, 2024Updated last year
- Data-Efficient Backdoor Attacks☆20Jun 15, 2022Updated 3 years ago
- ☆19Oct 26, 2022Updated 3 years ago
- ☆18Mar 24, 2023Updated 2 years ago